/dragonfly/share/examples/uefisign/ |
H A D | uefikeys | 20 keyfile="${1}.key" 29 [ ! -e "${keyfile}" ] || die "${keyfile} already exists" 33 openssl genrsa -out "${keyfile}" 2048 2> /dev/null || die "openssl genrsa failed" 34 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}"… 37 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | smime.c | 96 char *keyfile; member 170 if (smime_config.keyfile == NULL) { in smime_opt_inkey() 171 smime_config.keyfile = arg; in smime_opt_inkey() 197 smime_config.keyfile = arg; in smime_opt_inkey() 227 if (smime_config.keyfile == NULL) in smime_opt_signer() 237 smime_config.keyfile = NULL; in smime_opt_signer() 772 smime_config.keyfile)) in smime_main() 781 smime_config.keyfile = NULL; in smime_main() 868 if (smime_config.keyfile == NULL) in smime_main() 874 smime_config.keyfile = NULL; in smime_main() [all …]
|
H A D | spkac.c | 79 char *keyfile; member 109 .opt.arg = &spkac_config.keyfile, 205 if (spkac_config.keyfile) { in spkac_main() 207 strcmp(spkac_config.keyfile, "-") ? spkac_config.keyfile in spkac_main()
|
H A D | cms.c | 124 char *keyfile; member 224 if (cms_config.keyfile == NULL) { in cms_opt_inkey() 225 cms_config.keyfile = arg; in cms_opt_inkey() 250 cms_config.keyfile = arg; in cms_opt_inkey() 422 if (cms_config.keyfile == NULL) in cms_opt_signer() 432 cms_config.keyfile = NULL; in cms_opt_signer() 1225 cms_config.keyfile)) in cms_main() 1234 cms_config.keyfile = NULL; in cms_main() 1339 if (cms_config.keyfile == NULL) in cms_main() 1343 if (cms_config.keyfile == NULL) in cms_main() [all …]
|
H A D | dgst.c | 86 char *keyfile; member 140 dgst_config.keyfile = arg; in dgst_opt_prverify() 167 dgst_config.keyfile = arg; in dgst_opt_verify() 262 .opt.arg = &dgst_config.keyfile, 393 if (dgst_config.keyfile) in dgst_main() 414 if ((!!dgst_config.mac_name + !!dgst_config.keyfile + in dgst_main() 420 if (dgst_config.keyfile) { in dgst_main() 422 sigkey = load_pubkey(bio_err, dgst_config.keyfile, in dgst_main() 425 sigkey = load_key(bio_err, dgst_config.keyfile, in dgst_main()
|
H A D | rsautl.c | 82 char *keyfile; member 138 .opt.arg = &rsautl_config.keyfile, 280 pkey = load_key(bio_err, rsautl_config.keyfile, in rsautl_main() 285 pkey = load_pubkey(bio_err, rsautl_config.keyfile, in rsautl_main() 290 x = load_cert(bio_err, rsautl_config.keyfile, in rsautl_main()
|
H A D | pkeyutl.c | 89 static int init_ctx(char *keyfile); 404 init_ctx(char *keyfile) in init_ctx() argument 426 pkey = load_key(bio_err, keyfile, pkeyutl_config.keyform, 0, in init_ctx() 431 pkey = load_pubkey(bio_err, keyfile, pkeyutl_config.keyform, 0, in init_ctx() 436 x = load_cert(bio_err, keyfile, pkeyutl_config.keyform, in init_ctx()
|
H A D | enc.c | 92 char *keyfile; member 208 .opt.arg = &enc_config.keyfile, 387 if (enc_config.keyfile != NULL) { in enc_main() 391 infile = fopen(enc_config.keyfile, "r"); in enc_main() 394 enc_config.keyfile); in enc_main() 400 enc_config.keyfile); in enc_main()
|
H A D | s_time.c | 108 char *keyfile; member 166 .opt.arg = &s_time_config.keyfile, 294 s_time_config.keyfile)) in s_time_main()
|
H A D | ocsp.c | 115 char *keyfile; member 646 .opt.arg = &ocsp_config.keyfile, 870 if (!ocsp_config.keyfile) in ocsp_main() 871 ocsp_config.keyfile = ocsp_config.signfile; in ocsp_main() 886 key = load_key(bio_err, ocsp_config.keyfile, FORMAT_PEM, 0, in ocsp_main()
|
H A D | x509.c | 123 char *keyfile; member 297 x509_config.keyfile = arg; in x509_opt_signkey() 1211 x509_config.keyfile, in x509_main() 1244 if (x509_config.keyfile == NULL) { in x509_main() 1250 x509_config.keyfile, in x509_main()
|
H A D | req.c | 143 char *keyfile; member 343 .opt.arg = &req_config.keyfile, 740 if (req_config.keyfile != NULL) { in req_main() 741 pkey = load_key(bio_err, req_config.keyfile, req_config.keyform, 0, passin, in req_main()
|
H A D | ca.c | 187 char *keyfile; member 453 .opt.arg = &ca_config.keyfile, 824 if ((ca_config.keyfile == NULL) && in ca_main() 825 ((ca_config.keyfile = NCONF_get_string(conf, ca_config.section, in ca_main() 838 pkey = load_key(bio_err, ca_config.keyfile, ca_config.keyform, 0, in ca_main()
|
/dragonfly/contrib/libpcap/ |
H A D | sslutils.c | 57 void ssl_set_keyfile(const char *keyfile) in ssl_set_keyfile() argument 59 ssl_keyfile = keyfile; in ssl_set_keyfile() 93 char const *keyfile = ssl_keyfile[0] ? ssl_keyfile : "key.pem"; in ssl_init_once() local 94 if (1 != SSL_CTX_use_PrivateKey_file(ctx, keyfile, SSL_FILETYPE_PEM)) in ssl_init_once() 96 …snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_g… in ssl_init_once()
|
H A D | sslutils.h | 46 void ssl_set_keyfile(const char *keyfile);
|
/dragonfly/contrib/cryptsetup/lib/ |
H A D | libcryptsetup.h | 219 const char *keyfile, 265 const char *keyfile, 341 const char *keyfile,
|
H A D | setup.c | 1359 const char *keyfile, in crypt_resume_by_keyfile() argument 1385 if (!keyfile) in crypt_resume_by_keyfile() 1389 &passphrase_size_read, keyfile, keyfile_size); in crypt_resume_by_keyfile() 1493 const char *keyfile, in crypt_keyslot_add_by_keyfile() argument 1504 keyfile ?: "[none]", new_keyfile ?: "[none]"); in crypt_keyslot_add_by_keyfile() 1526 if (keyfile) in crypt_keyslot_add_by_keyfile() 1528 keyfile, keyfile_size); in crypt_keyslot_add_by_keyfile() 1704 const char *keyfile, in crypt_activate_by_keyfile() argument 1715 name, keyslot, keyfile ?: "[none]"); in crypt_activate_by_keyfile() 1732 if (!keyfile) in crypt_activate_by_keyfile() [all …]
|
/dragonfly/lib/libtcplay/ |
H A D | tcplay.h | 238 int opts_add_keyfile(struct tcplay_opts *opts, const char *keyfile); 239 int opts_add_keyfile_hidden(struct tcplay_opts *opts, const char *keyfile); 240 int opts_add_keyfile_new(struct tcplay_opts *opts, const char *keyfile);
|
H A D | tcplay.c | 2090 opts_add_keyfile(struct tcplay_opts *opts, const char *keyfile) in opts_add_keyfile() argument 2097 if ((keyf = strdup_safe_mem(keyfile)) == NULL) { in opts_add_keyfile() 2107 opts_add_keyfile_hidden(struct tcplay_opts *opts, const char *keyfile) in opts_add_keyfile_hidden() argument 2114 if ((keyf = strdup_safe_mem(keyfile)) == NULL) { in opts_add_keyfile_hidden() 2124 opts_add_keyfile_new(struct tcplay_opts *opts, const char *keyfile) in opts_add_keyfile_new() argument 2131 if ((keyf = strdup_safe_mem(keyfile)) == NULL) { in opts_add_keyfile_new()
|
/dragonfly/crypto/openssh/ |
H A D | README.dns | 15 ssh-keygen -r hostname -f keyfile -g 17 where "hostname" is your fully qualified hostname and "keyfile" is the
|
/dragonfly/contrib/cryptsetup/ |
H A D | ChangeLog | 5 * Fix luksFormat/luksOpen reading passphrase from stdin and "-" keyfile. 26 * Fix luksOpen reading of passphrase on stdin (if "-" keyfile specified). 114 * Do not call isatty() on closed keyfile descriptor.
|